“Operation Elicius”, a joint worldwide regulation enforcement operation involving Europol and police forces in Italy, France, and Romania, has efficiently dismantled a Romanian ransomware gang that focused network-attached storage (NAS) units and arrested its suspected chief.
The so-called “DiskStation Safety” ransomware group has focused and compromised NAS units – notably these manufactured by Synology – since 2021, leaving the information of companies and non-profit organisations encrypted, and demanding a ransom for its restoration.
Police say that their investigation started after a collection of complaints from quite a few firms within the Lombardy area of Italy, complaining that their operations had been paralysed as a result of they have been unable to entry their knowledge with out agreeing to present in to the extortionists’ demand for a considerable quantity of cryptocurrency.
The DiskStation ransomware gang, which has labored below different names together with “7even Safety”, “LegendaryDisk Safety”, “Umbrella Safety”, and “Fast Safety” has hit victims from a large spectrum of industries, together with graphic design, occasion organisation, film-making, in addition to non-government organisations akin to charities.
A two-pronged police investigation – combining an indepth digital forensic evaluation of hacked laptop programs and shut examination of the blockchain – finally led authorities to Bucharest, Romania.
In June 2024, police searched the houses of suspects in Bucharest, and arrested a 44-year-old Romanian nationwide, who’s suspected of being a key determine behind the ransomware group. The person, who has not been named, face costs of extortion and unauthorised entry to laptop programs.
With the arrest of the alleged ringleader of the DiskStation ransomware group, police are hoping that they’ve dealt a big blow to the felony operation that has proven no scruples in regards to the sorts of organisation it has attacked.
Synology has been advising customers on easy methods to defend their NAS units from ransomware assaults for a number of years. A lot of the recommendation revolves round minimising the publicity of NAS units to the web, hardening password safety, and guaranteeing that common backups are fabricated from crucial knowledge.
The accounts used to safe NAS units aren’t any completely different from some other on the subject of safety – it’s best to be certain that passwords are distinctive, and never easy-to-crack. Attackers will usually use automated instruments to brute drive their approach into poorly-secured units, or benefit from customers who’ve used easy-to-guess, predictable passwords.
To additional cut back danger, customers are urged to allow two-step verification (2FA) and, the place doable, disable or rename the default “admin” account altogether, as it’s a widespread goal for malicious hackers.
The publicity of NAS units could be restricted by disabling distant servies like QuickConnect, WebDAV, and SSH if they don’t seem to be required. Synology’s built-in firewall may also be used to limit entry by IP deal with, area, or protocol, serving to to forestall unauthorised connections.
As well as, it’s wise to make sure that NAS units are saved up-to-date with the newest safety patches and updates.
Extra details about easy methods to higher safe NAS units from ransomware could be discovered on Synology’s web site.
Editor’s Be aware: The opinions expressed on this and different visitor writer articles are solely these of the contributor and don’t essentially replicate these of Fortra.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s developments right this moment: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

